Computer Science Project Topics

This post lists computer science project topics based on Java, VB, .Net, HTML, PHP, MS SQL, SQL and Oracle database. It includes major and minor project topics, they can be further classified into web-based & stand-alone applications. If you come across any doubts, you are most welcome to comment on this post; we shall discuss and solve your doubts. If there is something wrong you can bring it to my notice I would be really glad to you.

Web-based Reward Points Management System

This project aims at building a reward points management system for the customer support team of the company. Objectives are to build

Development of an application for receiving orders for printing digital photographs

A customer can have a set of digital photographs in his desktop which he/she wants to print. He/she can provide the application the path to the folder where the photographs are stored and can choose the photos that he/she wants to print and choose the size of the prints. The application will calculate the price after downloading the price information from the database for the different print sizes and show it to the user. The user will enter his/her credit card/other payment option (or choose any other mode of payment) and shipping information if he/she wants to go ahead with the order. If the credit card information is found correct, the photos are uploaded to the server and a purchase order is created in the database.

Based on: vb, SQL Server/Oracle

Electronic Mail Server

The ‘electronic mail server’ has been developed to simplify and enhance inter-personnel communication in an intra-organizational setup. This follows a client-server approach where the website works on the server and the user from the client. The client requests the server for services and the server responds by transferring required information to the user. The site is going to be operated by the Internet users and administered by the organizational administrator who will be server based. The administrator will have the privilege to limit the number of users that can register as members. He can limit the number of emails, a particular user can store for himself. The administrator can also restore vital information in case of a serious breakdown. The user will operate from the client side by accessing the provisions provided by the website. This can be done irrespective of the geographical location. However, an internet connection with its entire infrastructure is a must. The provisions include getting registered as a member on the official website, composing and sending an e-mail to his counterparts thus sharing official information and official status on a particular aspect. Also is included the option of deleting unwanted messages from one’s mailbox and the facility to modify/change the personal information provided in the website like password, telephone number etc.

Offline drug details accessing portal

The vendor of the PDA-held devices, laptops, and desktops is providing the additional facilities for its clients. Here we are intended to develop one of the facilities which are providing by the vendor i.e. Drug information to the Doctors. Here we can have two types of applications:

Standalone

Net-based solution.

Based on: JSP, JDBC, Apache Tomcat

Development of an Interest Calculation system for a retail bank.

Consider a retail bank which collects money from customers and in return gives them an interest at a predetermined rate. Our objective is to automate this process of interest calculation. The system developed should calculate interest daily for each account having a balance more than zero at the correct interest rate. This interest calculated would be cumulatively stored in a table which will be updated every day. Remember that the balance on which interest is calculated daily will change based on bank’s decisions and also when the customer deposits or withdraws money. Every month the cumulative interest calculated is credited to the customer. After this point of time, the cumulative interest stored should be set to zero because the customer has benefited for the period specified. Before interest is credited to the customer’s account tax should be debited from the interest according to prevalent government laws.

Based on: vb, Java, Unix, Oracle, crystal reports.

Authentication using mobile phones

The proposed system involves using a mobile phone as a software token for one-time password generation. The generated one-time password is valid for only a short user-defined period of time and is unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization.

Based on: j2me

Student project allocation and management with Online Testing System (SPM)

In this project, we are developing a web-based system, which manages the activity of student project management and online testing. This system will manage the database and maintain a list of all student groups that have registered on this site, conduct their online test and shortlist those students who have passed the eligibility criteria as set by the professors.

The number of hacking and intrusion incidents is increasing every year as new technology rolls out. Unfortunately, in today’s digitally connected world, there is no place to hide. DNS, NSlookup, newsgroups, website crawling, e-mail properties etc. These are just some of the many ways in which you can be found. In this research project, we designed and build an intrusion detection system (IDS) that implements pre-defined algorithms for identifying the attacks over a network.

Based on: java/j2ee

Application Remote Control Using Bluetooth (ARC)

The primary objective of the application arc is to manage the computer applications executing in the personal computer or laptop using a mobile phone. This mobile phone should be bluetooth enabled and the personal computer or laptop should have the bluetooth dongle or any other bluetooth hardware installed.

Based on: bluetooth

Hospital Administration System

This software titled “hospital administration system” is aimed to serve two purposes. First, helping patients to manage their records and a hospital to manages patients and records in an organized manner. It helps to avoid carrying a long list of diagnostic reports, reference slips, test-request applications, prescriptions for medicines, account bills and so on. The major problem that affects the efficiency of treatment of patients and the management of the entire hospital is the time consumed in the manual processing of records, which are physical stationery. Second, patient administration. The details are posted to the database in the form of “forms” which are simulations of various forms that might be found in a hospital to store data, as reports, x-ray requisition forms etc. Each patient is given a unique “registration-number”. At a later stage, when it is required to access the medical history of the patient, the registration number is entered and based on which the records are searched and patient’s entire record scrolls before the user (the doctor).

Enterprise Level System Information Management (ELSIM)

Elsim is based on client/server technology to support network administrators so that the entire network can be managed at a single point along with effective GUI. ELSIM provides the administrator an extra hand to manage the clients. ELSIM has a client part and a server part.

Micro Controller based Security System using Sonar

This project is based on the principle of radar. This project has got a sonar module mounted on a stepper motor. As the stepper motor rotates, sonar module sends out ultrasonic waves and scans the room. So, if this project is placed in the center of a room, it can scan the whole area and the range of scanning depends on the sonar module used. With a Polaroid 6500 series sonar ranging module, the range is about 6″ to 35ft.This product is intended to be used for security alert systems in a room/area devoid of any movements.

Automatic Over Speed Detector

The operation of “over speed detector” depends on the simple one-dimensional equation of motion, i.e. Speed=distance/time. It consists basically of a source – sensor couple and a handheld device. The source- sensor couple is placed on the road at a distance of 1m from each other.when the operator gets a visual indication that a vehicle is over speeding, he can initiate the device from as far as 100m.when the vehicle cuts the first laser beam, the sensor is set and the transition pulse is transferred to the handheld device.The device now starts counting from a fixed clock. When the vehicle cuts the second laser beam, the transition pulse is again transferred to the device, which stops the counting. What we have now obtained is the time taken for the vehicle to cover a distance of 1m. This count is then decoded to obtain the speed-reading. Once the speed-reading is obtained, the official can decide whether the vehicle is over speeding or not as per the rules and regulations pertaining to different road conditions.

Local PCO Meter

This project is capable of barring std, ISD and mobile calls. Further this project cuts the local calls after the desired interval. Before disconnecting the call, the system alerts us by giving a beep sound which will enable the customer to continue after giving start pulse.

Honeypot

A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot.Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. The simulated computer systems appear to run on unallocated network addresses. To deceive network-fingerprinting tools, honeypot simulates the networking stack of different operating systems and can provide arbitrary routing topologies and services for an arbitrary number of virtual systems.

Device Controlling using TAPI

The project aims in developing a microcontroller based electronic relay operating system and a Microsoft Windows GUI application which act as an interface between user and system and also act as an interface between telephone system and microcontroller.The system can be considered as a combination of hardware and software units.the microcontroller based electronic relay operating system plus the personal computer is the hardware unit. Microsoft Windows GUI application which uses the Microsoft TAPI functions is the software part. The user’s command through the phone is handled by these TAPI functions and the program communicates with the microcontroller through a serial port to alter the device status according to users desire. The application also keeps a record of the status of devices in a database and it is updated after each operation. You can look at the GUI application as a software layer that lies between the microcontroller and telephone system. It provides the user an interface to add or remove new devices to the system.

Highway Alert Lamp

The project that we have done here can be used for safe highway driving. The lamp automatically emits brilliant tri-colour light when a vehicle approaches the rear side of the vehicle. And turns off when the approaching vehicle overtakes. This ultra-bright blue yellow and redheads of the signal alert lamp emit very bright light to alert vehicle’s driver even during daytime, giving additional safety during the night or when we need to stop our vehicle on the side of the highway. The circuit saves considerable battery power. 12v dc supply to the circuit can be provided by the car battery with proper polarity.

Multi-Tab Browser

A web-browser is nothing but a set of engines that can parse the content you receive over HTTP. A Browser consists of Two Engines: (1) Layout Engine and (2) JavaScript Engine. First, create these two engines and then you need to build a UI. You can create a Windows Application project in Visual Studio and it has a control in the toolbox named web browser. This uses the engines of Internet Explorer. You can alter the UI as you wish in your Windows Application. Learn more >>

Microcontroller Based Cellular Voting Machine

In this modern world people are forced to use electronic devices in their daily life. Now day’s electronic voting machines are used for the election. Here we introduced a cellular voting machine based on microcontroller. In this system, there are two units, a master unit, and a voting unit. The voting unit is placed anywhere and the master unit is placed in a control room. The voting unit contains a DTMF cover, which generates a DTMF tone and is transmitted to the master unit through the FM transmitter. The master contains an FM receiver, DTMF decoder, microcontroller and display units. The tone from the voting unit is received by the receiver and is decoded and specific functions are carried out by the microcontroller and then it is displayed.

Chat Server

The package “chat server” using java and ms access aims at developing a new chat server that could be easy for users and which could teach a new user how to involve in fluent chat and get well equipped with the chat server.the main goal of our package is communication. It allows all the registered users to establish good relations with all types of people involved in the internet. The users can develop their communication skills. It also helps in gathering information about different peoples. It also helps in understanding the culture of different peoples involved in the internet. The project titled “chat server” deals with email communication with peoples involved in the internet searching the site and chatting.the main aim of the project has been to develop web-enabled model software to computerize the lifestyle of peoples. Our site named “chat server” generates an environment for communication. Usually, it is a long boring task of waiting in front of the computer searching for users who have entered the server.

Design and development of Insurance Agents Samurai

The insurance agents samurai is the system meant for an insurance agent that helps to automate most of the functionalities in the insurance policy related activities. This system should have the facility to enter the customer details who wants to take an insurance scheme. The system should be able to provide necessary illustrations and calculate the premium amount. This system should also provide the facility to show the specification of the premium term as per the choice of premium value to be paid. If the customer decides to go for the selected insurance plan, the system should be able to generate the filled application form in ms word format.

This project was to develop intranet web pages for the human resources, personnel and administration departments of this firm. This had forms that enable the employees across the country to access all the information regarding the policies of employment like retirement promotion, pension, compensations, wage policies, fringe benefits schemes, etc

Based on: .net

Sudoku

The project “Sudoku” is a game that provisions to fill in empty boxes with numbers to form a series. The game can be of a size ranging from 3×3 to 10×10. The game could host a guest mode for trials.

Development of a Network packet sniffer

In this project, we are developing a packet sniffer on HTTP protocol. This sniffer should be able to monitor and save files transiting over the network. This project should be scalable to support other protocols like FTP, pop3 etc. The practical purpose of the project is providing monitoring ability for the administrator of a network. This can be deployed in home PC by parents to monitor the internet access, also. This has to build over any interface provided by freely available libraries for capturing packets on TCP/IP.

Based on: Unix, c++, TCP/IP, HTTP

Educational Information Management System

Educational portal for students, parents, teachers, and institutes to communicate in a complete knowledge-based interactive environment. Important for students to know individual strengths and weaknesses through self-assessment. Induces change in existing contents and methods of learning processes. Includes wireless features for anytime, anywhere communication.

Based on: java/j2ee

Development of a practical Online Help Desk (OHD) for the facilities in the campus

In this project, we are developing an online help desk (OHD) for the facilities in the campus. This is an Intranet based application that can be accessed throughout the campus. This system can be used to automate the workflow of service requests for the various facilities in the campus. This is one integrated system that covers different kinds of facilities like classrooms, labs, hostels, mess, canteen, gymnasium, computer center, faculty club etc. Registered users (students, faculty, lab assistants, and others) will be able to log in a request for service for any of the supported facilities. These requests will be sent to the concerned people, who are also valid users of the system, to get them resolved. There are features like email notifications/reminders, the addition of a new facility to the system, report generators etc in this system.

Based on: Ms-SQL server, HTML, active server pages

Bug Tracking System

The project entitled “bug tracking system” is an online bug tracking tool initiated with the objective to set up a user-friendly online bug tracking system. It can be used both for bug tracking and for project management. In this system, the project manager can have full details of the work assigned to each team member. Moreover, when a new work comes he can assign the work to different persons by having a view of the programmer with minimum work. This software assists to track the workflow of the work given to each team member by a project leader.The project usually comes to the company in the form of bugs. Usually, when certain enhancements of a product are being done i.e. when version updates of a product are being done, work is assigned to different programmers in the form of bugs. This software is mainly focused on the work coming in the form of bugs. The project manager can fully understand what the status of each bug is whether it is fixed, assigned, or won’t fix.

Development of a Repository and Search Engine for Alumni of College (RASE)

In this project we are developing a repository for the college alumni. The repository and search engine (RASE) is an Internet based application that can be accessed from anywhere. The portal is helpful to get information about the college developments and to keep all the alumni in touch.

Development of a user-friendly, feature-rich, practical Appraisal Tracker

In this project, we are developing an appraisal tracker that is of importance to either an organization or a college. This appraisal tracker system is used to track the performance of an individual. An individual’s performance is rated by himself and his superior in the organization.

Based on: Javascript, active server pages, HTML, DHTML, Oracle

Advertisement Management System

Technology has gained utmost importance in the social economic advancement of mankind by introducing a new product, process, and tools for improving the quality of day a life. Computers have helped automation of many industrial and business systems. Computer databases, can stores data in a different form starting from simple lines of text to complex data structures that include pictures, sounds or video images. Data management involves creating, modifying, deleting, and adding data to generate reports. The software that allows performing these functions is known as a database management system (DBMS). Thus the DBMS is a collection of data and program that help you to retrieve this data and perform operations on it.

Development of a Web Based Mail Client

This project is about developing a web based mail client connecting to a Linux server running a mail server and with Tomcat as the web server.The project has the following main functionality

1)user or client: user management includes adding/removing users, setting/modifying the access rights of users, setting the properties of the document management system etc. The system may also provide a guest user account. The administrator may define groups of users, which may have a common set of privileges. The administrator must be able to add/remove, setting/modifying the access rights of such groups. He should also be able to remove users from the system.

2)document: document management includes adding new document categories, removing existing document categories, modifying access and other settings of existing document categories, download and upload of documents for reading, update operations etc. The system must be able to categorize the documents in an organized manner. All the documents should be stored in a centralized database and must be accessible from various locations. The system must ensure that when an authorized user is modifying a particular file, it should not he accessible to any others until it is completely updated and saved. The system should provide for searching of documents based on keyword, documents names, category etc.. The system should provide a tree view listing of document categories. Each user can view only those document categories that are accessible to him. The system should maintain logs that keep track of the history of the files.

3)security: Security module deals with the secrecy and protection of the desired documents. It consists of sub-modules namely user module and category module.user module operates in two modes: administrator mode and user mode. The administrator may define groups of users, which may have a common set of privileges. The administrator must be able to add/remove, setting/modifying the access rights of such groups. The administrator must set read-only or read-write permissions for each document category for every individual user. User mode enables the user to create a new account on specifying the personal details. The forget password entry enables the user to retrieve his/her password by answering a secret question correctly.

Digital Stopwatch

This digital stopwatch can count nine minutes and 59.9 seconds. The circuit consists of a 555 astable multivibrator. It generates 10 pulses in one second. We can enable or disable IC 555 by applying a high or low voltage to pin 4 of 555. This is done by IC 7476. 7476 is a jk flip-flop. It’s j and k input give a high level. Therefore this flip-flop toggles at each trailing edge of the clock pulse. Here clock pulses are given by push-to-on switch s1.Ic 7490 counts the pulses of the astable multivibrator. It counts up to 9 (1001). When the first counter reaches nine, the second counter starts counting, because it gets a trailing edge when the first display goes from 9 to 0. So it reaches one second. The third display begins its counting as the second display changes from 9 to 0. Then the display counts 10 seconds. When the count of the third display reaches 6, both input terminals of a NAND gate of ic 7400 becomes high. So its output becomes low. This output appears as a trailing edge of the fourth display and it starts counting then the output of the NAND gate gets inverted. C now becomes high. This is applied to reset pin of 7490. Therefore all counters except 4 reset to 0. The display shows 1.000. I.e. 1 minute and 0 seconds. Ic 7447 is used to convert BCD to 7-segment form.

High-Speed Data Transfer using Performance Adaptive UDP

present a protocol that can maximally utilize the bandwidth of these private links through a novel performance-based system flow control. On high-speed, high-latency, congestion-free networks, a protocol should strive to accomplish two goals: to maximize goodput by minimizing synchronous, latency-bound communication and to maximize the data rate according to the receiver’s capacity. Latency-bound communication is one of the primary problems of TCP due to the positive acknowledgment congestion window mechanism. When UDP is used in tandem with TCP, UDP packets can be sent asynchronously, allowing the synchronous TCP component to do its job without limiting the overall bandwidth.

Onlne Test Taking System (OTTS)

This project involves four types of users – Administrator, Principal, Teacher, student. This is a web application.

Students are allowed to take tests and view results.

Teachers are allowed to submit questions, schedule exams and can view student’s results.

The principal is allowed to approve exam dates proposed by teachers and view all students records class wise.

Admin will classify students according to class and insert all the student’s records. Admin can add multiple schools if the application is enabled across schools.

Based on: sql/oracle(any DB), jsp/servlets/html/css, apache tomcat(you can use eclipse).

Injecting false data attack is a well known serious threat to the wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. A novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data is proposed. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filter the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink.

Software Requirements

Operating System: Windows Family

Language: Java

Front End: Java Swing

IDE Used: Netbeans/Eclipse

Algorithm to be used

Sensor Node Initialization

CNR Based MAC Generation

CNR Based MAC Verification

Sink Verification

Project to check trustworthiness of websites

The world-wide-web has become the most important information source for most of us. Unfortunately, there is no guarantee for the correctness of information on the web. Moreover, different websites often provide conflicting information on a subject, such as different specifications for the same product. This project proposes a new problem called Veracity that is conformity to truth, which studies how to find true facts from a large amount of conflicting information on many subjects that is provided by various websites. We design a general framework for the Veracity problem, and invent an algorithm called Truth Finder, which utilizes the relationships between websites and their information, i.e., a website is trustworthy if it provides many pieces of true information, and a piece of information is likely to be true if it is provided by many trustworthy web sites. Our experiments show that Truth Finder successfully finds true facts among conflicting information, and identifies trustworthy websites better than the popular search engines.

Software Specification

FRONT END : Java, J2ee (JSP, Servlet)

TOOL USED : Dream weaver

SERVER : Web logic

OPERATING SYSTEM : Windows

BACK END : SQL Server

Optimize Storage Placement in Sensor Networks

Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. Storage nodes are introduced in this project to store the data collected from the sensors in their proximity. The storage nodes alleviate the heavy load of transmitting all data to a central place for archiving and reduce the communication cost induced by the network query. The objective of this project is to address the storage node placement problem aiming to minimize the total energy cost for gathering data to the storage nodes and replying queries. We examine the deterministic placement of storage nodes and present optimal algorithms based on dynamic programming.

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

Correlation-based traffic analysis attacks on anonymity networks

In this project, we address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks. Mixes have been used in many anonymous communication systems and are supposed to provide countermeasures to defeat traffic analysis attacks. We focus on a particular class of traffic analysis attacks, flow correlation attacks, by which an adversary attempts to analyze the network traffic and correlate the traffic of a flow over an input link with that over an output link. Two classes of correlation methods are considered, namely time-domain methods and frequency-domain methods. Based on our threat model and known strategies in existing mix networks, we perform extensive experiments to analyze the performance of mixes. We find that all but a few batching strategies fail against flow-correlation attacks, allowing the adversary to either identify ingress and egress points of a flow or to reconstruct the path used by the flow. Intuitively, some batching strategies are actually detrimental against attacks. The empirical results provided in this paper give an indication to designers of mix networks about appropriate configurations and mechanisms to be used to counter flow-correlation attacks.

A Techie, Blogger, Web Designer, Programmer by passion who aspires to learn new Technologies every day. A founder of Krazytech. It's been 10+ years since I am publishing articles and enjoying every bit of it. I want to share the knowledge and build a great community with people like you.